27.07.2013 Views

The Illuminati Formula Used to Create an ... - Get a Free Blog

The Illuminati Formula Used to Create an ... - Get a Free Blog

The Illuminati Formula Used to Create an ... - Get a Free Blog

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

was developed by AT&T <strong>an</strong>d uses C l<strong>an</strong>guage. (Bear in mind that there are dialects of<br />

UNIX, such as the st<strong>an</strong>dard AT&T UNIX <strong>an</strong>d for inst<strong>an</strong>ce Berkeley UNIX. <strong>The</strong> UNIX system<br />

uses both timesharing <strong>an</strong>d multitasking.<br />

<strong>The</strong> mind of a Monarch slave also does both multitasking <strong>an</strong>d time sharing. One of the<br />

nice UNIX features, is "protected memory", which is also part of the Monarch<br />

programming. A kernal is what the UNIX programmers call a "protected person". It is<br />

very similar <strong>to</strong> the internal "person" (alter) who helps the Monarch slave’s programming<br />

functions.<br />

<strong>The</strong> big item about UNIX is that it has permissions gr<strong>an</strong>ted. This is similar <strong>to</strong> the Monarch<br />

programming. Permissions are gr<strong>an</strong>ted <strong>to</strong> 3 types of entities. <strong>The</strong> Top Programmer or<br />

"god" as he is called, of the UNIX System receives what is called the individual<br />

permission. <strong>The</strong> next permission is called group permission, <strong>an</strong>d it is given <strong>to</strong> insiders<br />

who work with the system. <strong>The</strong> final permission type is the world, which has very limited<br />

access. <strong>The</strong> parallel between this <strong>an</strong>d the Monarch programming is surprising. In some<br />

cases the programmers may have matched things on a one-<strong>to</strong>-one correspondence.<br />

<strong>The</strong> Monarch program also has a Top Programmer who is called "god" <strong>to</strong> the System. He<br />

has <strong>to</strong>tal control over the system. His programming permissions c<strong>an</strong> not be<br />

deprogrammed out by others who might w<strong>an</strong>t <strong>to</strong> usurp his power.<br />

Hidden from the casual user of the UNIX system are the Daemons <strong>an</strong>d Demons. <strong>The</strong><br />

UNIX programmers decided <strong>to</strong> use the old english spelling for demon = Daemon. <strong>The</strong>se<br />

are computer processes which work secretly behind the scenes <strong>an</strong>d are given actual<br />

demonic names, some corresponding <strong>to</strong> actual names of his<strong>to</strong>rically known demons, such<br />

as Asmodeus. Asmodeus is also a demon which is placed in<strong>to</strong> m<strong>an</strong>y Monarch slaves.<br />

In the UNIX system these demons are treated like persons in the computer’s user<br />

direc<strong>to</strong>r. Demons in the computer system do not have <strong>to</strong> log on<strong>to</strong> the computer, but they<br />

work behind the scenes <strong>an</strong>d are given the same powers that people users are given.<br />

<strong>The</strong>y are set up in the same structure as how the computer treats people. Permission in<br />

the UNIX system is gr<strong>an</strong>ted using <strong>an</strong> 8 bit count with 0 through 7. <strong>The</strong> three kinds of<br />

permission are the read, write, <strong>an</strong>d execute permissions. If no permission were gr<strong>an</strong>ted<br />

in <strong>an</strong>y way the UNIX system would indicate" "on the screen which me<strong>an</strong>s 000000 000 or<br />

nine 0’s.<br />

<strong>The</strong> super user called god is given the code 777 which me<strong>an</strong>s super user. However, the<br />

permission of 666 gives the user the power <strong>to</strong> everything the 777 permission gives,<br />

except that the 777 permission allows the god the master programmer <strong>to</strong> execute not<br />

executable programs.<br />

<strong>The</strong> Postmaster Demon is the head demon, <strong>an</strong>d his permission level in UNIX is 666. (In<br />

the Monarch Programming "Mr. Postm<strong>an</strong>" is a code word used internationally.) <strong>The</strong> most<br />

import<strong>an</strong>t part of the BEAST system is its communication power. <strong>The</strong> Electronic Mail<br />

System of the BEAST allows it <strong>to</strong> communicate worldwide, <strong>an</strong>d along with electronic mail<br />

comes levels of permission <strong>to</strong> super user (god) is called Root.<br />

A programmer on the Beast must get permission. His program must get permission. That<br />

program that gives permission must also get permission. In other words, there are levels<br />

of permission that must be gone through.<br />

This is similar <strong>to</strong> the Monarch program. For inst<strong>an</strong>ce, the alters personalities which would<br />

control the body during <strong>Illuminati</strong> gatherings have very tight access permission. It is very<br />

hard <strong>to</strong> access these hierarchy personalities. Both the UNIX system (<strong>an</strong>d the Monarch<br />

115

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!